How to Leverage Defense-in-Depth to Minimize Risk


This event qualifies for 1 CertNexusCEC


Federal agencies are not immune to security attacks, even if their controls and processes are as tight as Fort Knox. Some of the world’s most technologically advanced enterprises, from Microsoft to SolarWinds to Okta, have faced security incidents and were exposed to risk.

 

Many of these successful cyber attacks did not start with hackers fighting their way through firewalls and intrusion prevention systems or executing zero-day exploits. Instead, threat actors compromised user credentials, took over legitimate user identities and gained access to internal systems and resources.

 

Join us to learn about use cases that illustrate identity security and defense-in-depth strategies, including:

  • Monitoring and auditing high-risk web sessions
  • Securing access to all types of resources with adaptive MFA
  • Protecting endpoints and enforcing the principle of least privilege
  • Providing secure third-party privileged access to critical internal resources
  • Storing and sharing credentials for password-based business apps and other sensitive data

Speaker and Presenter Information

Presenter

Barak Feldman
National Director
CyberArk Software, Inc.
 
Presenter
Sandra Jontz (Moderator)
VP of Communications and Chief Knowledge Officer, Associate Publisher
AFCEA International/SIGNAL Magazine

Relevant Government Agencies

Other Federal Agencies, Federal Government, State & Local Government


Event Type
Webcast


This event has no exhibitor/sponsor opportunities


When
Wed, Jun 22, 2022, 1:00pm ET


Cost
Complimentary:    $ 0.00


Website
Click here to visit event website


Event Sponsors


Organizer
AFCEA | Signal Webinar Series


Contact Event Organizer



Return to search results